291 Hits in 5.7 sec

Darker than Black-Box: Face Reconstruction from Similarity Queries [article]

Anton Razzhigaev, Klim Kireev, Igor Udovichenko, Aleksandr Petiushko
2021 arXiv   pre-print
We propose a novel approach that allows reconstructing the face querying only similarity scores of the black-box model.  ...  Although some of these approaches work in a black-box setup using only face embeddings, usually, on the end-user side, only similarity scores are provided.  ...  , KIREEV, UDOVICHENKO, PETIUSHKO: DARKER THAN BLACK-BOX RAZZHIGAEV, KIREEV, UDOVICHENKO, PETIUSHKO: DARKER THAN BLACK-BOX RAZZHIGAEV, KIREEV, UDOVICHENKO, PETIUSHKO: DARKER THAN BLACK-BOX  ... 
arXiv:2106.14290v2 fatcat:ucp6rbp5nzaxzoo5k5cf5xhfmm

A Survey of Black-Box Adversarial Attacks on Computer Vision Models [article]

Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru
2020 arXiv   pre-print
Hence, in this paper, we propose to present a comprehensive comparative study of various black-box adversarial attacks and defense techniques.  ...  significant amount of research has focused on the reliability of such models, primarily in two aspects - white-box, where the adversary has access to the targeted model and related parameters; and the black-box  ...  It is described using synsets similar to WordNet. There are more than 20,000 categories that have been annotated using more than 100,000 synset categories from WordNet.  ... 
arXiv:1912.01667v3 fatcat:cq5kjjta2zhxfirrj2tevn7noi

A Survey of Privacy Attacks in Machine Learning [article]

Maria Rigaki, Sebastian Garcia
2021 arXiv   pre-print
Our contribution in this research is an analysis of more than 40 papers related to privacy attacks against machine learning that have been published during the past seven years.  ...  Although the body of work in privacy has been steadily growing over the past few years, research on the privacy aspects of machine learning has received less focus than the security aspects.  ...  The only black-box reconstruction attack until now was proposed by Yang et al. [104] .  ... 
arXiv:2007.07646v2 fatcat:sj7z2h2dhfdybgc234ha6hkrdq

Black-Box Approaches to Fair Machine Learning

Samuel Yeom
Black-box methods, which require only query accessto the model, are well suited for this purpose, as they are feasible to carry out without knowing the full details of the model.  ...  These methods require only black-box access to the model, allowing them to be effective even when the model holder is uncooperative.  ...  The implementation of a linear regression model can be reconstructed efficiently with black-box access by using Gaussian elimination.  ... 
doi:10.1184/r1/16920208 fatcat:ockrs6xjrfge5irodkrgdkwehq

Disentangled Neural Architecture Search [article]

Xinyue Zheng, Peng Wang, Qigang Wang, Zhongchao Shi
2020 arXiv   pre-print
However, existing methods rely heavily on a black-box controller to search architectures, which suffers from the serious problem of lacking interpretability.  ...  On the NASBench-101 dataset, DNAS achieves state-of-the-art performance of 94.21% using less than 1/13 computational cost of baseline methods.  ...  than 1/13 computational cost (150 queries vs. 2000 queries).  ... 
arXiv:2009.13266v1 fatcat:uo4o26iwyvb23nmhhwbagxzx4u

DISSECT: Disentangled Simultaneous Explanations via Concept Traversals [article]

Asma Ghandeharioun, Been Kim, Chun-Liang Li, Brendan Jou, Brian Eoff, Rosalind W. Picard
2022 arXiv   pre-print
By training a generative model from a classifier's signal, DISSECT offers a way to discover a classifier's inherent "notion" of distinct concepts automatically rather than rely on user-predefined concepts  ...  several concepts, (2) are influential to a classifier's decision and are coupled to its reasoning due to joint training (3), are realistic, (4) preserve relevant information, and (5) are stable across similar  ...  Explanations should produce the desired outcome from the black-box classifier f .  ... 
arXiv:2105.15164v4 fatcat:aymyl3j45rdcjisqy2oxld3yiy

Bayesian Optimization with Missing Inputs [article]

Phuc Luong, Dang Nguyen, Sunil Gupta, Santu Rana, Svetha Venkatesh
2020 arXiv   pre-print
Bayesian optimization (BO) is an efficient method for optimizing expensive black-box functions. In real-world applications, BO often faces a major problem of missing values in inputs.  ...  We first find a probability distribution of each missing value so that we can impute the missing value by drawing a sample from its distribution.  ...  Given a historical data [X, y] and a black-box function f : X → R (X is the input domain), X may contain missing values as mentioned in Case 1, and if we query a point x t ∈ X to compute the function value  ... 
arXiv:2006.10948v1 fatcat:3hepgwxskfeullwnu3gbnlorbi

GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [article]

Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash
2022 arXiv   pre-print
GRAPHITE is also flexible as it can easily trade-off transform-robustness, perturbation size, and query count in black-box settings.  ...  ., robustness of a attack to environmental physical variations such as viewpoint and lighting changes, and 3) supporting attacks in not only white-box, but also black-box hard-label scenarios, so that  ...  Conversely, darker areas in Fig. 4a are good candidates for elimination from the mask.  ... 
arXiv:2002.07088v6 fatcat:gbgooezwcfa7bduoupz6leg4du

Trustworthy AI: A Computational Perspective [article]

Haochen Liu, Yiqi Wang, Wenqi Fan, Xiaorui Liu, Yaxin Li, Shaili Jain, Yunhao Liu, Anil K. Jain, Jiliang Tang
2021 arXiv   pre-print
In this survey, we present a comprehensive survey of trustworthy AI from a computational perspective, to help readers understand the latest technologies for achieving trustworthy AI.  ...  An adversary aims to extract the model information by querying the machine learning model in a black-box setting such that he can potentially fully reconstruct the model or create a substitute model that  ...  In [55, 168] , the authors showed that face recognition systems work better for white compared to darker faces.  ... 
arXiv:2107.06641v3 fatcat:ymqaxvzsoncqrcosj5mxcvgsuy

Biometric, Fingervein, Machine L Implementation of a Security System, Using Captured Fingervein, Applying the Concepts of Machine Learning

Oyinloye Oghenerukevwe Elohor, Akinbohun Folake, Thompson Aderonke, Korede Bashir
2020 International Journal Of Engineering And Computer Science  
This work also includes the implementation of an Android fingerprint biometric system using the Android Near InfraRed (NIR) module, which exists to show the similarities and differences between the two  ...  However, a "black-box" classifier cannot be blindly trained which assumes that features are ordered.  ...  These peaks correspond to the boundary of the finger and scanning lens, which contains the brightest pixels (since brighter pixels have higher intensity values than darker ones).  ... 
doi:10.18535/ijecs/v9i04.4470 fatcat:5ijoqsgbjzaynijhincaxi642q

Object Recognition: Physiological and Computational Insights [chapter]

Doris Y. Tsao, Charles F. Cadieu, Margaret S. Livingstone
2010 Primate Neuroethology  
(C) Reconstruction of the test shape from the population response in B.  ...  The contrast between the inside and the outside of the circle was not critical (G), but the spots and the bar had to be darker than the disk (H).  ... 
doi:10.1093/acprof:oso/9780195326598.003.0024 fatcat:ry5wi3rfczdixcyxmktjbtfmn4

Emergent linguistic structure in artificial neural networks trained by self-supervision

Christopher D. Manning, Kevin Clark, John Hewitt, Urvashi Khandelwal, Omer Levy
2020 Proceedings of the National Academy of Sciences of the United States of America  
Indeed, we show that a linear transformation of learned embeddings in these models captures parse tree distances to a surprising degree, allowing approximate reconstruction of the sentence tree structures  ...  J.H. and C.D.M. were partly funded by a gift from Tencent Corp.  ...  However, while this black box approach teaches us that the model learns some form of syntax, it does not tell us how.  ... 
doi:10.1073/pnas.1907367117 pmid:32493748 fatcat:qzfpgwccgfcc7joah43nurdmze

Deep Neural Network Perception Models and Robust Autonomous Driving Systems [article]

Mohammad Javad Shafiee, Ahmadreza Jeddi, Amir Nazemi, Paul Fieguth,, Alexander Wong
2020 arXiv   pre-print
In a black-box attack the adversarial method does not have access to the model, so the adversary has to query the target model in order to estimate those needed aspects of the model's interior structure  ...  ATTACKS ARE CHARACTERIZED BASED ON WHETHER THEY ARE WHITE-BOX OR BLACK-BOX (I.E., HAVING ACCESSING TO MODEL DETAILS OR NOT), THE NUMBER OF NETWORK QUERIES Table VII VII summarizes the main tech- niques  ... 
arXiv:2003.08756v1 fatcat:w2ajk6ryrzg4bl5avd3thod5ti

In Search of Lost Space: Stan Douglas's Archaeology of Cinematic Darkness

Noam M. Elcott
2012 October  
Douglas's black box galleries were never entirely black.  ...  The darkness of a cinema or black box gallery establishes a paradigm very different from that offered by Minimalism.  ...  That recognizability is preserved in the exhibition history of Overture-a history that traverses nascent black-box galleries and aging movie theaters.  ... 
doi:10.1162/octo_a_00084 fatcat:tjm2euunbva3rooziaxgghoxoy

Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Interpretability, and Ethical Challenges [article]

Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, Khalil Khan, Junaid Qadir, Ala Al-Fuqaha
2021 arXiv   pre-print
As its name implies, the ultimate objective of the adversary is to clone or reconstruct the target model, reengineering a black-box model, or to compromise the nature and the properties of the training  ...  [138] Facial Expression Recognition Model Extraction CNNs Multiple dataset including AR Face [139] , BU3DFE [140] , and JAFFE [141] It aims to analyze whether a black box CNNs model can be steal  ... 
arXiv:2012.09110v4 fatcat:yxh5tvpehbgldcblweoovbvdsq
« Previous Showing results 1 — 15 out of 291 results